Securing Control and Data Planes From Reconnaissance Attacks Using Distributed Shadow Controllers, Reactive and Proactive Approaches | IEEE Journals & Magazine | IEEE Xplore